Browsing by Keywords for Webfeeds Information Security

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  

Showing results 64 to 83 of 103 < previous   next >
Issue DateTitleInvolved Person(s)
2023PIM detection in wireless networks as an anomaly detection problemCantali, Gokcan; Deniz, Eren; Ozay, Ozcan; Yildirim, Onur; Gür, Gürkan, et al
13-Jul-2005PKI und Digitale Signatur : Theorie, Politik, Wunschdenken und RealitätRennhard, Marc; Mumprecht, Eduard
Aug-2019PoMeS : profit-maximizing sensor selection for crowd-sensed spectrum discoveryBayhan, Suzan; Gür, Gürkan; Zubow, Anatolij
2023Prioritization based task offloading in UAV-assisted edge networksKalinagac, Onur; Gür, Gürkan; Alagöz, Fatih
2022Priority-driven task processing in UAV-assisted software-defined edge networksKalinagac, Onur; Gür, Gürkan; Alagöz, Fatih
2020Proactive controller assignment schemes in SDN for fast recoveryGuner, Selcan; Gür, Gürkan; Alagöz, Fatih
25-Oct-2018PROFINET Real-time protection layer : performance analysis of cryptographic and protocol processing overheadMüller, Thomas; Doran, Hans
2018Protecting PROFINET cyclic real-time traffic : a performance evaluation and verification platformMüller, Thomas; Doran, Hans
2019Reactive controller assignment for failure resilience in software defined networksAcan, Faruk; Gür, Gürkan; Alagöz, Fatih
2023Root cause and liability analysis in the microservices architecture for edge IoT servicesKalinagac, Onur; Soussi, Wissem; Anser, Yacine; Gaber, Chrystel; Gür, Gürkan
2018Safety & cyber-security analysis based on systems-theoryFrischknecht-Gruber, Carmen; Senn, Christoph W.; Krauss, Sven Stefan; Reif, Monika Ulrike
26-Oct-2004Schutz der Privatsphäre aus BenutzersichtRennhard, Marc
4-Feb-2009Schwachstellen in Web-Applikationen : was steckt dahinter und wie nutzt man sie aus?Rennhard, Marc
2009Schwachstellen in Web-Applikationen : was steckt dahinter und wie nutzt man sie aus?Rennhard, Marc
28-May-2009Schwachstellen in Web-Applikationen : was steckt dahinter und wie nutzt man sie aus?Rennhard, Marc
22-Mar-2019Schwachstellen vor den Hackern finden : automatisierte Sicherheitstests von IT-SystemenRennhard, Marc
Dec-2023SealClub : computer-aided paper document authenticationOchoa Ronderos, Martin; Vanegas, Hernán; Toro-Pozo, Jorge; Basin, David
2019Secure microcontrollersSchläpfer, Tobias; Rüst, Andreas
2019Secured communication channels in software-defined networksYigit, Beytullah; Gür, Gürkan; Tellenbach, Bernhard; Alagöz, Fatih
2012SecureSafe : a highly secure online data safeRennhard, Marc; Tschannen, Michael; Christen, Tobias